Improper Input Validation Affecting qemu-project/qemu package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
22.55% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-QEMUPROJECTQEMU-3006887
  • published26 Jan 2022
  • disclosed12 Apr 2010
  • creditUnknown

Introduced: 12 Apr 2010

CVE-2010-0741  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

There is no fixed version for qemu-project/qemu.

Overview

Affected versions of this package are vulnerable to Improper Input Validation. The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).

References

CVSS Scores

version 3.1